About Us | Contact Us
View Cart
Archive for 'Technical Security Standards' Category

Getting Started on Cybersecurity

By Dan Hadaway - Last updated: Thursday, July 9, 2015

Process Flow for Institutions . . . and why Dan loves the Cybersecurity Assessment Tool! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Real quick:  What should you do to get started on understanding the new Cybersecurity Assessment Tool (and its impact on future […]


Ultrasonic Technology Takes Fingerprint Security to the Next Level

By Vigilize - Last updated: Monday, July 6, 2015

Mobile devices getting a boost in security with ultrasonic 3D fingerprint scanner. A new 3D imaging technique of fingerprint scanning, using an ultrasonic sensor, has researchers excited about the prospects of “smartphone security” to another level. We’ve never been enthusiastic about biometrics. Way back in the early 2000’s one of our “early adopter” Clients inadvertently […]


Segregation Not!

By Vigilize - Last updated: Monday, June 29, 2015

Study shows that network engineers are knee deep in Information Security Investigations.


Over Sensationalized Internet Security Marketing

By Vigilize - Last updated: Monday, April 27, 2015

An article review. Beware of buzzwords Our friend and associate Joe Cychosz sent us this article a few days ago, and we thought it was worth sharing. This brief article highlights an alarming trend within the InfoSec world, where security vendors are hyping and spinning their offerings to the point of untruth! Now this may […]


Survey Finds Most Firms Would Take Hours to Detect Breach

By Vigilize - Last updated: Wednesday, April 1, 2015

An article review. You have to detect the breach first Many companies have plans for when a breach occurs. After all, there is no such thing as 100% security. As Dan Hadaway will highlight in his upcoming “Turning Lemons into Lemonade with Incident Response” webinar on April 2nd, it’s only a matter of time before […]


Two New Statements, One Read!

By Dan Hadaway - Last updated: Tuesday, March 31, 2015

Dan gives a quick rundown on the two statements released by the FFIEC on 03/30/15.


Windows Susceptible to FREAK Attack After All

By Vigilize - Last updated: Sunday, March 22, 2015

An article review. Microsoft admits that Internet Explorer is vulnerable to HTTPS hack Earlier this month, Microsoft announced that any Windows computer running any version of Internet Explorer is vulnerable to a FREAK attack. Now the FREAK vulnerability has been around for years; however, it was believed to only affect certain browsers and devices, like […]


Keep Your BYOD Policy Updated

By Vigilize - Last updated: Wednesday, March 18, 2015

An article review. New Device automates iOS Pin Hacking Many companies have Bring Your Own Device policies in place, where employees are allowed to bring their own PCs or mobile devices into the workplace or have business utilities, like email, setup on their personal devices. They also usually have extensive policies allowing remote wiping, etc. […]


Would I love to interview Lenovo’s Incident Response Team!

By Dan Hadaway - Last updated: Friday, March 6, 2015

How much can failure be worth? Dan gets an idea while filling out a “customer satisfaction survey!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So though I tried to comment on Lenovo’s site during the early days of their Superfish incident and they wouldn’t […]


Hardware vendors . . . low risk?

By Dan Hadaway - Last updated: Tuesday, February 24, 2015

Dan’s changing is standard response about hardware vendors.